US20100150170A1 - Scalable and Robust Mechanism for Remote IP Device Monitoring With Changing IP Address Assignment - Google Patents
Scalable and Robust Mechanism for Remote IP Device Monitoring With Changing IP Address Assignment Download PDFInfo
- Publication number
- US20100150170A1 US20100150170A1 US12/335,671 US33567108A US2010150170A1 US 20100150170 A1 US20100150170 A1 US 20100150170A1 US 33567108 A US33567108 A US 33567108A US 2010150170 A1 US2010150170 A1 US 2010150170A1
- Authority
- US
- United States
- Prior art keywords
- snmp
- predetermined
- response
- address
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0681—Configuration of triggering conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0213—Standardised network management protocols, e.g. simple network management protocol [SNMP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
Abstract
Description
- Exemplary embodiments relate generally to communications, and more particularly, to remote monitoring of IP devices having changing IP addresses.
- Since the Internet has become an essential part of daily business, connectivity monitoring is performed of devices (such as, Netgate devices or Cisco routers) using dynamic host configuration protocol (DHCP) IP addresses provided by an Internet Service Provider (ISP).
- Some customers may utilize virtual private networks (VPN) such as AT&T VPN Tunnel Services (AVTS) and AT&T NB IP-VPN Remote Access (ANIRA) Service, and the remote customers at small office/home office (SOHO) locations may often use Netgate devices or Cisco routers to access corporate VPN networks for emails, client/server applications, Intranet applications, WWW access, etc. The connection is usually provided by AT&T or other service providers via dial up, xDSL, cable modem, and ISDN types of internet connection connections.
- For some customers, e.g., a major local branch office, the customers always want the connection to be up, except maybe occasional disconnect/connect bounce of the connections by ISPs to re-claim IP addresses and assign new ones. However, if the connection is down for more than a certain time, this down time may impact the customer's business operation. Thus, the customer wants the ISP to proactively monitor the connection failure, notify them of any problem, troubleshoot the problems, and recover the service.
- It has been a challenge to monitor these remote location devices, i.e., routers, modems, etc., since the IP connection monitoring application has to know the IP address of the remote device in order to perform pinging or polling of the device while its IP addresses change from time to time as the ISPs bounce the connections from time to time to re-claim existing IP addresses and assign new IP addresses.
- Exemplary embodiments include a method for monitoring devices with changing Internet protocol (IP) addresses. When a device is connected to the network, an SNMP trap is sent by the remote device at a first IP address to notify the monitor application that a connection is up. In response to receiving the SNMP trap from the device, an SNMP poll is transmitted from the monitor application to the device to obtain an identifier for the device. The first IP address is corresponded to the identifier, which is the permanent identifier of the device. A sequence of SNMP GET requests is transmitted at predefined time intervals to the device, where the corresponding sequence of SNMP GET responses are transmitted back by the device. In response to failing to receive from the device a predetermined number of consecutive SNMP GET responses equal to the predetermined threshold, it is determined that there is possibly a connection failure or a device failure. In response to determining that there is a possible failure, it is checked whether the device is in a maintenance window. In response to determining that there is a possible failure, there is a wait for a predetermined period for the device and its connection to back up, where the device has a second IP address and the same identifier. In response to determining that the device is in a maintenance window or its connection is back up within the predetermined period, no trouble ticket is generated. If the device is not in a maintenance window and is not back up within the predetermined period, a trouble ticket is generated for the device.
- Other systems, methods, apparatus, and/or computer program products according to embodiments will be or become apparent to one with skill in the art upon review of the following drawings and detailed description. It is intended that all such additional systems, methods, apparatus, and/or computer program products be included within this description, be within the scope of the exemplary embodiments, and be protected by the accompanying claims.
- Referring now to the drawings wherein like elements are numbered alike in the several FIGURES:
-
FIG. 1 is a block diagram which illustrates fault management of remote devices with changing IP addresses in accordance with exemplary embodiments; -
FIG. 2 illustrates a data structure in Table 1 that may be used in a service inventory module in accordance with exemplary embodiments; -
FIG. 3 illustrates a data structure in Table 2 for an active monitoring session table of a monitoring dispatcher module in accordance with exemplary embodiments; -
FIG. 4 illustrates a data structure for a local active monitoring session table of the fault monitoring module in Table 3 in accordance with exemplary embodiments; -
FIG. 5 illustrates a data structure in a trouble ticket module as Table 4 in accordance with exemplary embodiments; -
FIGS. 6 and 7 illustrate an interaction diagram for proactive monitoring of remote devices in accordance with exemplary embodiments; -
FIG. 8 depicts a 2-server configuration illustrating scalability and disaster recovery in accordance with exemplary embodiments; -
FIG. 9 depicts an N×2 server configuration illustrating scalability and disaster recovery in accordance with exemplary embodiments; -
FIGS. 10 and 11 illustrate a method for monitoring devices with changing Internet protocol addresses in accordance with exemplary embodiments; -
FIG. 12 illustrates an example of a computer having elements that may be used in implementing exemplary embodiments. - The detailed description explains the exemplary embodiments, together with features, by way of example with reference to the drawings.
- Exemplary embodiments provide a scalable and robust solution for connectivity and device monitoring of remote Internet Protocol (IP) network devices with constant changing IP addresses. Since an IP address is the most common identifier of devices in the IP network, changing IP address provides a unique challenge to network service providers to monitor the connectivity and operational status of these devices. Exemplary embodiments can leverage several innovative techniques and the simple network management protocol (SNMP) to monitor varieties of remote IP devices from multiple vendors at the customer premises.
- Exemplary embodiments provide mechanisms for proactively monitoring customer premises equipment (CPE) devices with changing IP addresses provided by a variety of ISPs. Exemplary embodiments provide scalable options for large service provider IP networks for connectivity and operation status monitoring of a large number of managed CPE devices with changing IP addresses, and provide a disaster recovery solution for 24×7 monitoring of the remote CPE devices.
- Exemplary embodiments are flexible in the monitoring technology for performing a heartbeat check between the monitoring application and the remote CPE device, e.g., using ICPM ping, SNMP polling, or http queries. Therefore, it supports monitoring of multiple vendor devices using different monitoring technologies. Also, exemplary embodiments are capable of supporting scheduled maintenance windows of the remote devices to avoid false alarms when the device is taken off-line for maintenance, and enable the service provider to synchronize (sync) up the device inventory data with the live production data to identify non-active devices or to recover re-usable disconnected assets. Exemplary embodiments use a tunable smoothing interval (e.g., 15 minutes) to accommodate occasional IP address flipping of the remote device by the Internet Service Provider (ISP) which uses Dynamic Host Control Protocol (DHCP) for remote device IP address assignment. Exemplary embodiment use the SNMP traps/notifications for device operational status monitoring, which complements the heart beat monitoring to provide complete fault monitoring of the remote devices, such as customer routers and switches. The Dynamic Host Configuration Protocol (DHCP) is a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it connects to the network. In some systems, the device's IP address can even change while it is still connected.
- A CPE device is telecommunications hardware located at the home or business of a customer. Such equipment might include cable or satellite television set-top boxes, digital subscriber line (DSL), broadband Internet routers or modems, VoIP base stations, telephone handsets, or other customized hardware used by a particular telecommunications service provider.
- Now turning to
FIG. 1 ,FIG. 1 is a block diagram 100 which illustrates fault management of remote devices (CPEs) with changing IP addresses in accordance with exemplary embodiments. Aservice monitoring system 110 may be operatively connected to anetwork 120 for monitoring remote devices. The remote devices may be one ormore routers 50, one ormore communication devices 60, and/or any type of CPE. Thecommunication device 60 may be representative of modems, hubs, servers, set top boxes, and other devices for operatively connecting to a network. Thecommunication device 60 is configured to operatively connectnetworked devices 65 to thenetwork 120. For example, thecommunication device 60 may be the interface to connect computers, such asnetworked devices 65, to the Internet (e.g., the network 120). Also, therouter 50 is configured to operatively connectnetworked devices 55 to thenetwork 120. - Further regarding the
network 120, thenetwork 120 may include circuit-switched and/or packet-switched technologies and devices, such as routers, switches, hubs, gateways, etc., for facilitating communications. Thenetwork 120 may include wireline and/or wireless components utilizing, e.g., IEEE 802.11 standards for providing over-the-air transmissions of communications. Thenetwork 120 can include IP-based networks for communication between a customer service center and clients/users. Thenetwork 120 can manage multiple accounts as established by particular users. These accounts may then be used to provide access to services as described herein. - Also, the
network 120 may include wireline and/or wireless components utilizing standards for, e.g., multimedia messaging services (MMS). Thenetwork 120 may include a multimedia messaging center (MMC), which implements the network side of multimedia messaging service (MMS) and makes it possible for an operator to offer multimedia messaging to mobile communication device users. The MMC is a highly flexible system, which can be adapted to the needs of the operator and the particular end users involved. The MMC manages different sources to/from mobile terminals, supporting a wide range of standard interfaces. - According to exemplary embodiments, the
network 120 facilitates transmission of media (e.g., images, video, data, multimedia messaging, etc.) from content services provider systems to customers/users via devices. In exemplary embodiments, thenetwork 120 can include a managed IP and/or wireless network administered by a service provider, which can control bandwidth and quality of service for the communications discussed herein. Thenetwork 120 may be implemented in a wireless fashion, e.g., using wireless protocols and technologies, such as WiFi, WiMax, BLUETOOTH, etc. Thenetwork 120 can also be a packet-switched network, such as a local area network, a wide area network, a metropolitan area network, an Internet network, or other similar types of networks. Thenetwork 120 may be a cellular communications network, a fixed wireless network, a wireless local area network (LAN), a wireless wide area network (WAN), a personal area network (PAN), a virtual private network (VPN), an intranet or any other suitable network, and thenetwork 120 may include equipment for receiving and transmitting signals, such as a cell tower, a mobile switching center, a base station, and a wireless access point. - The
service monitoring system 110 may include one or more monitor dispatchers (MD) 20 and one or more fault monitors (FM) 30. Also, theservice monitor system 110 may include or be operatively connected to a service inventory (SI) 10 and a trouble ticket (TT) 40. Theservice monitoring system 110, the monitor dispatcher (MD) 20, fault monitor (FM) 30, the service inventory (SI) 10, and the trouble ticket (TT) 40 may be implemented in servers or other computing devices as components, modules, applications, application specific integrated circuits, etc., and may be distributed over a network. - In accordance with exemplary embodiments, the service inventory (SI) module 10 may be responsible for maintaining the remote device information, e.g., equipment ID, location, type, vendor, site ID, and the like for devices such as the
router 50 and thecommunication device 60. The customer information may include, e.g., contacts, addresses, phone numbers, email addresses, beeper numbers, and the like. The site information may include, e.g., site ID, site address, site phone, etc. The service inventory 10 may include the service information for a device, such as, e.g., service type, features, configuration, etc. Also, the service inventory 10 may include service assurance information for the device such as, e.g., AT&T managed or customer managed, and if AT&T managed, for example, the service assurance information may include the scheduled maintenance windows if any. - The monitor dispatcher (MD)
module 20 may be responsible for interfacing with the SI 10 to retrieve device and service assurance information, responding to remote device monitoring request prompts to initiate the monitoring session, identifying the equipment ID of the remote device, distributing the remote device monitoring to the appropriate fault monitor (FM) 30, and trap forwarding to the fault monitor (FM) 30 based on the trap and device information. - The fault monitor (FM)
module 30 may be responsible for receiving and storing the session monitoring information from theMD 20; performing heartbeat monitoring of the remote device via ICMP ping, SNMP polling, http queries, or etc.; processing traps or unsolicited event notification from the remote devices; detecting connection or operation problems of the remote devices (CPEs) and creating a request for generating trouble tickets as needed; and performing sync up between the SI module 10 and the active monitoring device information to check for discrepancies. - The trouble ticket (TT) 40 module may be responsible for generating pro-active trouble tickets based on events/alarms received from the FM 30 (for connection or device failure and for out-of-sync devices between SI 10 and MD 20).
- For illustrative purposes and not limitation, the block diagram 100 depicts the
MD 20 and theFM 30 as part of theservice monitoring system 110 and shows the SI 10 and theTT 40 as external applications. It is understood that any arrangement could be implemented in accordance with exemplary embodiments, and the SI 10,MD 20,FM 30, and/orTT 40 can be locally or remotely situated from one another. - In
FIG. 1 , although exemplary embodiments illustrate the monitor dispatcher 20 (MD) and the fault monitors (FM) 30 as one integral service monitoring (application) system 11, it is understood that the monitor dispatcher (MD) 20 and the fault monitors 30 (FM) could be separate. Exemplary embodiments illustrate two external interfaces, i.e., between the service inventory (SI) 10 and the monitor dispatcher (MD) 20 and between the fault monitor (FM) 30 and the trouble ticket (TT) 40. Also, there is an internal interface between theMD 20 and theFM 30. - The combined functions of the
MD 20 and theFM 30 may include any feature of fault monitoring, fault management, or service assurance application in the Operation Support System (OSS) architecture. - Tables 1-4 are shown in
FIGS. 2-5 to present examples of data structures which can be utilized in exemplary embodiments. Although simple data structures are presented inFIGS. 2-6 for illustrative purposes and brevity, it is understood that other data structures may be utilized to capture the same information. -
FIG. 2 illustrates a data structure in Table 1 that may be used in the service inventory (SI) 10. The data structure in the SI 10 is to enable theMD 20 to distribute the monitoring sessions todifferent FM 20 servers, and more data may be needed for the load balancing, distribution algorithm of theMD 20. If so, additional data may be added to the data structure in Table 1. Table 1 is a device table that provides various information about the device, such as therouter 50 and thecommunication device 60, being monitored. The SI 10 would include a device table for each device monitored by theMD 20 andFM 30. - To illustrate exemplary embodiments, two tables are referenced for the
MD 20 which are a device table and active monitoring session table. The device table (Table 1 ofFIG. 2 ) for theMD 20 is imported from the SI 10. A separate device table is not shown for theMD 20 as reference is made to Table 1 ofFIG. 2 . TheMD 20 includes respective device tables, such as Table 1, for each remote device being monitored. -
FIG. 3 illustrates a data structure in Table 2 for the active monitoring session table of theMD 20. The Table 2 provides information for the monitoring session of a device, and the Table 2 would relate to a plurality of devices being monitored. As mentioned earlier, for theMD 20 to distribute the monitoring sessions todifferent FM 30 servers, more data may be needed for the load balancing, distribution algorithm, and additional data can be added to the data structure. - The data structure in the
FM 30 may include a local device table (e.g., Table 1 ofFIG. 2 ) and a local active monitoring session table (e.g., Table 3 ofFIG. 4 ). The local device table of theFM 30 is omitted and reference can be made to the device table in Table 1 ofFIG. 2 .FIG. 4 illustrates the data structure for the local active monitoring session table in Table 3. TheFM 30 also includes a corresponding local active monitoring session table in Table 3 for each device that theFM 30 is responsible for monitoring. -
FIG. 5 illustrates a data structure in theTT 40 as Table 4. Table 4 is a trouble ticket table which includes information regarding devices that have connection or device problems. TheTT 40 may utilize information in the Table 4 to generate trouble tickets for devices being monitored. - For the SI-to-MD interface, the SI 10 sends total service assurance information about all managed devices to the
MD 20 daily or weekly for a total sync-up, and the SI 10 sends incremental service assurance information about add-change-delete of managed devices (such as adding therouters 50 and/or removing the communication device 60) at hourly or periodical intervals. - For the FM-to-TT interface, the
FM 30 sends ticketing request to theTT 40 to create or update trouble tickets. - For the MD-to-FM interface (which may be internal to the service monitor system 110), the
MD 20 transmits session monitoring request to theFM 30 to start session monitoring. TheMD 20 forwards traps to theFM 30 for trap processing and event correlation. TheFM 30 transmits session confirmation response to theMD 20 to maintain in the master active session table in theMD 20 for trap forwarding. TheFM 30 transmits session termination notification to theMD 20 to end monitoring session in the master active session table for trap forwarding. - Exemplary embodiments enable the service provider to proactively monitor any connection and device problems associated with CPEs at customer sites that change their IP addresses from time-to-time. A trouble ticket will be generated automatically when a critical or major problem is detected. Driven by the pro-active trouble ticket, the customer care supporting staff will immediately be notified to resolve the problem and/or to contact the customer. Also, the customers may pay a premium for the proactive monitoring service, for which the service provider has the responsibility to keep the service running 24×7 except for scheduled maintenance windows in accordance with exemplary embodiments. Once a problem occurs, the service provider may be required to recover the service within a certain time window as specified in the service level agreement (SLA).
-
FIGS. 6 and 7 illustrate an interaction diagram for proactive monitoring of remote devices in accordance with exemplary embodiments. - For ease of understanding and illustrative purposes only, the proactive monitoring is broken down into several stages of operation. It is appreciated that exemplary embodiments are not meant to be limited by the explanatory stages of operation.
-
Stage 1—Pre-Process and Initialization: - At 1.1, the SI 10 sends a monitored device list (full or delta) to the
MD 20 such as the device table in Table 1, including the MAC address (e.g., a unique device identifier), monitored or not monitored, regional code, and maintenance window. At 1.2, theMD 20 creates separate monitored device lists fordifferent FMs 30. For example, separate monitored device list may be created for FM east, FM west, FM central, FM south, etc. - At 1.3, when a remote device (such as the
routers 50 and communication devices 60) establishes a new connection to thenetwork 120, the remote device sends SNMP traps, e.g., cold start, warm start, Internet protocol security (Ipsec) tunnel start traps, to theMD 20 to notify that the connection is up for the remote device. IPsec is a suite of protocols for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPsec can be used to protect data flows between a pair of hosts (e.g., computer users or servers), between a pair of security gateways (e.g., routers or firewalls), or between a security gateway and a host. - At 1.4, the
MD 20 performs SNMP Poll of the remote device to obtain the remote device MAC address. The IP-to-MAC mapping is stored in the monitoring session table, such as the master active monitoring table in Table 2 ofFIG. 3 . A monitoring session starts when the connection from the monitoring station (e.g., the service monitoring system 110) to the remote device is up and ends when the connection is down. - At 1.5, utilizing the MAC address and monitored device list from the SI 10, the
MD 20 determines whichFM 30 is responsible for monitoring the device. The distribution logic can be round-robin, by region, by service type, by customer, etc. There may be many fault monitors 30, such as a fault monitor west that is responsible for the west side of the country and a fault monitor east that is responsible for the east side of the country. - At 1.6, the
MD 20 sends the monitoring session request, along with the IP address and MAC address of the remote device, to theresponsible FM 30. TheFM 30 checks if the device needs to be monitored, e.g., if the device is in or out of a maintenance window. If YES the device needs to be monitored as the device is not in a maintenance window, a monitoring session is established and the IP-to-MAC address mapping is stored in FM for the entire monitoring session. If NO the device does not need to be monitored at this time, no monitoring session is established. The monitoring session can be established when theFM 30 determines that the device is not in a maintenance window. - At 1.7, the
FM 30 sends a confirmation back to theMD 20 for maintaining in the master monitoring session table in the Table 2 ofFIG. 3 . -
Stage 2—Heartbeat Monitoring: - At 2.1, the FM 30 (west) sends “SNMP GET” request via, e.g., secure shell (SSH) to the remote device. SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices.
- At 2.2, the remote device sends “SNMP GET:” response back via SSH to the
FM 30. - At 2.3, the
FM 30 and the remote device repeat steps 2.1 and 2.2 at predetermined and tunable time interval, e.g., repeated every 5, 10, 15, 20, 25, 30, 35 minutes or more. -
Stage 3—Connection or Device Failure: - At 3.1, when there is a connection or device failure, the
FM 30 sends 3 (tunable) consecutive SNMP: GET with no responses from the device. TheFM 30 may continuously increase the tunable interval between the 3 consecutive SNMP: GET. For example, theFM 30 may send the first SNMP: GET to the device, and receive no response back from the device. TheFM 30 may send the second SNMP: GET to the device after a period of time (e.g., 20 minutes), and receive no response back from the device. TheFM 30 may send the third consecutive SNMP: GET to the device after a longer period of time (e.g., 45 minutes), and receive no response back from the device. If no SNMP GET response is received from the device after transmitting 3 consecutive SNMP: GET, theFM 30 may determine that there is a connection down event. For example, theFM 30 may determine (preliminarily) that there is potential problem regarding the device, such as a device failure or a connection failure. - At 3.2, the
FM 30 sends a session terminated notification toMD 20 for maintaining in the master monitoring session table in the Table 2 ofFIG. 3 . Note that the MAC address of the device is stored inFM 30 at the beginning of the monitoring session. The monitoring session is ended when there is a disconnect or device failure. The monitoring session and the IP-to-MAC address mapping will be re-established when a monitoring request is received again from the remote device, i.e., repeat step 1.3-1.7 discussed earlier. - At 3.3, the
FM 30 applies a tunable smoothing interval (e.g., 15 min) to the connection down event by waiting for the connection up event from the same device within the smoothing interval. The smoothing interval is applied to accommodate IP address flipping by the ISP. The smoothing interval allows theFM 30 time to wait for the device (e.g., therouter 50 or communication device 60) to obtain a new IP address. In accordance with exemplary embodiments, therouter 50 is preconfigured to transmit a connection up SNMP trap to theMD 20 once therouter 50 establishes a new connection to thenetwork 120 and obtains its new IP address. Step 1.3 to Step 1.7 are repeated. When transmitting the connection up event, the remote device, e.g.,router 50, is configured to transmit its new IP address along with its MAC address to theMD 20 andFM 30. With this information, theFM 30 can correlate the MAC address of the device with the previously stored MAC address of the device, even though the device now has a new IP address. If the device is back up within the predetermined and tunable time window, no trouble ticket is generated. Accordingly, theMD 20 and theFM 30 are designed to accommodate IP address changes of the device (router 50) and to continue monitoring the device via Step 2.1 to Step 2.3 with the new IP address. - Also, the
FM 30 checks the monitoring list from the SI 10 by utilizing the MAC address of the device to see if a trouble ticket needs to be generated (e.g., not in a maintenance window and is not reconnected to thenetwork 120 within the predetermined time window) for the device. If YES a trouble ticket needs to be generated, a ticket generation request will be sent to the trouble ticket (TT)module 40 for the device. -
Stage 4—SNMP Trap Processing: - At 4.1, the device sends SNMP traps to the
MD 20. - At 4.2, the
MD 20, using the IP address of the device and the master active monitoring table to find theresponsible FM 30, forwards the traps to theFM 30 for processing. - At 4.3, the
FM 30 requests for trouble ticket generation by thetrouble ticket 40 application if needed based on the severity of the SNMP traps. - Stage 5—Inventory Verification or Server-End Initialized Verification:
- At 5.11, the
FM 30 checks periodically (tunable) for the differences of the device in the local active monitoring session table (in the Table 3 ofFIG. 4 ) versus the monitored device list of Table 1 ofFIG. 2 from SI 10 (e.g., monitored or not, maintenance window, etc). If a device is in the monitored device list, but not in the active monitoring table, it may be caused by configuration errors of the remote device. On the other hand, if a device is in the active monitoring session table, but not in the monitored device list, it may be caused by inventory data errors. - At 5.12, the
FM 30 creates an error report for customer care associates to investigate the differences in comparing the monitored device list and the active monitoring table. - Now turning to scalability and disaster recovery configurations of exemplary embodiments, two design issues are scalability for growth and availability for disaster recovery. Exemplary embodiments can enhance scalability and disaster recovery with the addition of the monitoring dispatcher (MD) module, the distribution of multiple fault monitoring (FM) modules, and server-side initiated heartbeat as discussed herein.
-
FIG. 8 depicts a 2-server configuration illustrating scalability and disaster recovery in accordance with exemplary embodiments. Aserver 800 represents a primary server A at site A. Theserver 800 can implement themonitor dispatcher module 20 and thefault monitor module 30 in accordance with exemplary embodiments. - A
server 810 represents a backup server B at site B, which is a different location from site A of theprimary server 800. Theserver 810 implements the backupmonitor dispatcher module 20 and thebackup fault monitor 30, and theserver 810 can be utilized in disaster recovery. - The
remote router 50 andcommunication device 60 send notifications to both theMD 20 in the server A (800) and theMD 20 in the server B (810). During normal operations, theactive MD 20, which is in the primary server A (800), is responsible for dispatching. The primary server A (800) at site A and the backup server B (810) at site B are configured to synchronize with each other and to perform heartbeat check with each other, so that both server A and server B are aware of their respective status. As such, the primary server A (800) can utilize heartbeat monitoring to recognize when the backup server B (810) is down, and the backup server B (810) can utilize heartbeat monitoring to recognize when the primary server A (800) is down. - Also, the
servers router 50 and thecommunication device 60. If theMD 20 in the primary server A (800) has more recent remote device data than theMD 20 in the backup server B (810), or if theMD 20 in the backup server B (810) has more recent remote device data than theMD 20 in the primary server A (800), the primary server A and/or the backup server B are respectively configured to determine if there is a problem with (theMD 20 in) the backup server B or the (MD 20 in the primary server A. - As an example of a disaster recovery scenario, the primary server A (800) at site A is down, and the
MD 20 andFM 30 of theserver 800 are down. Accordingly, theMD 20 in the backup server B (810) picks up the MD function of the down server A (800). Also, theFM 30 in the backup server B (810) picks up the FM function of the down server A (800). -
FIG. 9 depicts an N×2 server configuration illustrating scalability and disaster recovery in accordance with exemplary embodiments. As discussed herein, there can be multiple fault monitors 30, and the responsibility of the fault monitors 30 may be delineated by region, such as west, central, east, etc. - A
server 900 represents a primary server A at site A. Theprimary server 900 can implement themonitor dispatcher module 20 and the faultmonitor west module 30 in accordance with exemplary embodiments. Aserver 905 represents a backup server B at site B, which is a different location from site A of theprimary server 900. Thebackup server 905 implements the backupmonitor dispatcher module 20 and the backup faultmonitor west module 30, and theserver 905 can be utilized in disaster recovery. - A
server 910 represents a primary server C at site C. Theprimary server 910 can implement the faultmonitor east module 30 in accordance with exemplary embodiments. Aserver 915 represents a backup server D at site D, which is a different location from site C of theprimary server 910. Thebackup server 915 implements the backup fault monitoreast module 30, and theserver 915 can be utilized in disaster recovery. - Further, a
server 920 represents a primary server E at site E. Theprimary server 920 can implement the fault monitorcentral module 30 in accordance with exemplary embodiments. Aserver 925 represents a backup server F at site F, which is a different location from site E of theprimary server 920. Thebackup server 925 implements the backup fault monitorcentral module 30, and theserver 925 can be utilized in disaster recovery. - As discussed above for
FIG. 8 , the server synchronization and heartbeat check can be performed between the various primary servers and their respective backup servers. - Also, the
remote devices MDs 20 in the servers A (900) and in the server B (905). Theactive MD 20 is responsible for dispatching. If more than 2primary FMs 30 are needed for the FM functions, the MD function does not need to be duplicated on the additional FM servers, but could be if desired. Only one primary and one backup MD functions (centralized) are illustrated inFIG. 9 . Accordingly, theMD 20 in the primary server A (900) and/or in the backup server B (905) can provide the MD function to correlate withrespective FMs 30 for the primary andbackup servers - For illustrative purposes only, the following are different disaster recovery scenarios. In
disaster scenario 1, the primary server A (900) at site A is down. TheMD 20 in the backup server B (905) picks up the MD function of the down primary server A (900). The FM west 20 in the server B (905) picks up the FM west function of the down primary server A (900). - In
disaster recovery scenario 2, the primary server C (910) at site C is down. The FM east 30 in the server D (915) picks up the FM east function the down primary server C (910). - In
disaster recovery scenario 3, theMD module 20 in server A (900) is down. TheMD 20 in the server B (905) picks up the MD function of the down server A (900). - In
disaster recovery scenario 4, the primary server E (920) at Site E is down. The FM central 30 in the backup server F (925) picks up the FM central function. -
FIGS. 10 and 11 illustrate amethod 1000 for monitoring devices with changing Internet protocol addresses in accordance with exemplary embodiments. - The
MD 20 receives an SNMP trap via thenetwork 120 from a remote device (such as, therouter 50 and the communication device 60) having a first IP address to notify that a connection is up when the device is connected to thenetwork 120 at 1005. - In response to the
MD 20 receiving the SNMP trap from the device, theMD 20 transmits an SNMP poll via thenetwork 120 to the device to obtain a MAC address for the device at 1010. - The
MD 20 corresponds the first IP address to the MAC address for the device and stores the IP to MAC address mapping and sends the information toFM 30 for fault monitoring at 1015. - The
FM 30 transmits a sequence of SNMP GET requests to the device via thenetwork 120, where the corresponding sequence of SNMP GET responses are transmitted back from the remote devices (e.g., 15 minute intervals) at 1020. - In response to the
FM 30 failing to receive from the device a predetermined number of consecutive SNMP GET responses equal to the predetermined and tunable threshold, theFM 30 determines that there is a possible connection failure (of the device to the network or to the Internet) and/or a possible device failure at 1025. - In response to determining that there is the possible failure, the
FM 30 checks whether the device is in a maintenance window at 1030. - In response to determining that there is the possible failure, the
FM 30 waits a predetermined period (e.g., 10, 15, 20 minutes) for the device and its connection to be back up and reconnect to the network, where the device has a second IP address and the same MAC address at 1035. - In response to determining that the device is in a maintenance window or is back up within the predetermined time period, the
FM 30 does not generate a trouble ticket at 1040. - In response to determining that the device is not in a maintenance window and is not back up within the predetermined time period, the FM 30 (via TT 40) generates a trouble ticket for the device at 1045.
- Further, in response to failing to receive from the device a predetermined number of consecutive SNMP GET responses, the
FM 30 recognizes a preliminary failure of the device. TheFM 30 checks the MAC address for the device received during the predetermined waiting period against the previous MAC address for the device to determine that both are the same MAC address, recognizes that the first IP address is different from the second IP address, and corresponds the MAC address to the second IP address for the device. Also, in response to determining that the device has the same MAC address, theFM 30 does not cause a trouble ticket to be generated for the device. If a monitoring session is interrupted, the device is configured to notify a monitoring module (such as the FM 30) that the connection is back up. The monitoring module represents a plurality of monitoring modules distributed across a network, and the plurality of monitoring modules are respectively responsible to monitor a plurality of devices. If any of the plurality of monitoring modules are down, backup monitoring modules are responsible to monitor the plurality of devices in place of any of the down plurality of monitoring modules. -
FIG. 12 illustrates an example of acomputer 1200 having elements that may be used in implementing exemplary embodiments. Thecomputer 1200 includes, but is not limited to, PCs, workstations, laptops, PDAs, palm devices, servers, mobile devices, communication devices, cell phones, and the like. Thecomputer 1200 may include aprocessor 1210,memory 1220, and one or more input and/or output (I/O) 1270 devices (or peripherals) that are communicatively coupled via a local interface (not shown). The local interface can be, for example but not limited to, one or more buses or other wired or wireless connections, as is known in the art. The local interface may have additional elements, such as controllers, buffers (caches), drivers, repeaters, and receivers, to enable communications. Further, the local interface may include address, control, and/or data connections to enable appropriate communications among the aforementioned components. - The
processor 1210 is a hardware device for executing software that can be stored in thememory 1220. Theprocessor 1210 can be virtually any custom made or commercially available processor, a central processing unit (CPU), a data signal processor (DSP), or an auxiliary processor among several processors associated with thecomputer 1200, and theprocessor 1210 may be a semiconductor based microprocessor (in the form of a microchip) or a macroprocessor. - The
memory 1220 can include any one or combination of volatile memory elements (e.g., random access memory (RAM, such as dynamic random access memory (DRAM), static random access memory (SRAM), etc.)) and nonvolatile memory elements (e.g., ROM, erasable programmable read only memory (EPROM), electronically erasable programmable read only memory (EEPROM), programmable read only memory (PROM), tape, compact disc read only memory (CD-ROM), disk, diskette, cartridge, cassette or the like, etc.). Moreover, thememory 1220 may incorporate electronic, magnetic, optical, and/or other types of storage media. Note that thememory 1220 can have a distributed architecture, where various components are situated remote from one another, but can be accessed by theprocessor 1210. - The software in the
memory 1220 may include one or more separate programs, each of which comprises an ordered listing of executable instructions for implementing logical functions. In the example illustrated inFIG. 12 , the software in thememory 1220 includes a suitable operating system (O/S) 1250,compiler 1240,source code 1230, and one ormore applications 1260 of the exemplary embodiments. - The
operating system 1250 controls the execution of other computer programs, and provides scheduling, input-output control, file and data management, memory management, and communication control and related services. It is contemplated by the inventors that theapplication 1260 for implementing exemplary embodiments is applicable on all other commercially available operating systems. - The
application 1260 may be a source program, executable program (object code), script, or any other entity comprising a set of instructions to be performed. When a source program is to be executed, then the program is usually translated via a compiler (such as the compiler 1240), assembler, interpreter, or the like, which may or may not be included within thememory 1220, so as to operate properly in connection with the O/S 1250. Furthermore, theapplication 1260 can be written as (a) an object oriented programming language, which has classes of data and methods, or (b) a procedure programming language, which has routines, subroutines, and/or functions, for example but not limited to, C, C++, C#, Pascal, BASIC, API calls, HTML, XHTML, XML, ASP scripts, FORTRAN, COBOL, Perl, Java, ADA, .NET, and the like. - The I/
O devices 1270 may include input devices such as, for example but not limited to, a mouse, keyboard, scanner, microphone, biometric input device(s), etc. Furthermore, the I/O devices 1270 may also include output devices, for example but not limited to, a printer, display, etc. Also, the I/O devices 1270 may further include devices that communicate both inputs and outputs, for instance but not limited to, a NIC or modulator/demodulator (for accessing remote devices, other files, devices, systems, or a network), a radio frequency (RF) or other transceiver, a telephonic interface, a bridge, a router, etc. The I/O devices 1270 include may include modems, gateways, receivers, transmitters, transceivers, etc. for communicating over a communications network. - When the
computer 1200 is in operation, theprocessor 1210 is configured to execute software stored within thememory 1220, to communicate data to and from thememory 1220, and to generally control operations of thecomputer 1200 pursuant to the software. Theapplication 1260 and the O/S 1250 are read, in whole or in part, by theprocessor 1210, perhaps buffered within theprocessor 1210, and then executed. - When the
application 1260 is implemented in software, it should be noted that theapplication 1260 can be stored on virtually any computer readable medium for use by or in connection with any computer related system or method. In the context of this document, a computer readable medium may be an electronic, magnetic, optical, or other physical device or means that can contain or store a computer program for use by or in connection with a computer related system or method. - The
application 1260 can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. In the context of this document, computer programs tangibly embodied on a computer-readable medium can be stored, communicated, propagated, or transported for use by or in connection with the instruction execution system, apparatus, or device. The computer readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. - More specific examples (a nonexhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic) having one or more wires, a portable computer diskette (magnetic or optical), a random access memory (RAM) (electronic), a read-only memory (ROM) (electronic), an erasable programmable read-only memory (EPROM, EEPROM, or Flash memory) (electronic), an optical fiber (optical), and a portable compact disc memory (CDROM, CD R/W) (optical). Note that the computer-readable medium could even be paper or another suitable medium, upon which the program is printed or punched, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
- In exemplary embodiments, where the
application 1260 is implemented in hardware, theapplication 1260 can be implemented with any one or a combination of the following technologies, which are each well known in the art: a discrete logic circuit(s) having logic gates for implementing logic functions upon data signals, an application specific integrated circuit (ASIC) having appropriate combinational logic gates, a programmable gate array(s) (PGA), a field programmable gate array (FPGA), etc. - As described above, the exemplary embodiments can be in the form of computer-implemented processes and apparatuses for practicing those processes. The exemplary embodiments can also be in the form of computer program code containing instructions embodied in tangible media, such as floppy diskettes, CD ROMs, hard drives, or any other computer-readable storage medium, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing the exemplary embodiments. The exemplary embodiments can also be in the form of computer program code, for example, whether stored in a storage medium, loaded into and/or executed by a computer. When the computer program code is loaded into an executed by a computer, the computer becomes an apparatus for practicing the exemplary embodiments. When implemented on a general-purpose microprocessor, the computer program code segments configure the microprocessor to create specific logic circuits. It is understood that computer program code can be transmitted over some transmission medium, loaded into and/or executed by a computer, or transmitted over some transmission medium, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation.
- While the invention has been described with reference to exemplary embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from the essential scope thereof Therefore, it is intended that the invention not be limited to the particular embodiments disclosed for carrying out this invention, but that the invention will include all embodiments falling within the scope of the claims. Moreover, the use of the terms first, second, etc. do not denote any order or importance, but rather the terms first, second, etc. are used to distinguish one element from another. Furthermore, the use of the terms a, an, etc. do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced item.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/335,671 US7898939B2 (en) | 2008-12-16 | 2008-12-16 | Scalable and robust mechanism for remote IP device monitoring with changing IP address assignment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/335,671 US7898939B2 (en) | 2008-12-16 | 2008-12-16 | Scalable and robust mechanism for remote IP device monitoring with changing IP address assignment |
Publications (2)
Publication Number | Publication Date |
---|---|
US20100150170A1 true US20100150170A1 (en) | 2010-06-17 |
US7898939B2 US7898939B2 (en) | 2011-03-01 |
Family
ID=42240466
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/335,671 Expired - Fee Related US7898939B2 (en) | 2008-12-16 | 2008-12-16 | Scalable and robust mechanism for remote IP device monitoring with changing IP address assignment |
Country Status (1)
Country | Link |
---|---|
US (1) | US7898939B2 (en) |
Cited By (95)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090271667A1 (en) * | 2008-04-23 | 2009-10-29 | Hitachi, Ltd. | Apparatus and Method for Monitoring Computer System |
US8446920B2 (en) * | 2011-06-14 | 2013-05-21 | Mitel Networks Corporation | Providing resilient digital telephony services for wireless device |
US20140269506A1 (en) * | 2013-03-14 | 2014-09-18 | Silver Springs Networks, Inc. | Set of optimizations applicable to a wireless networks operating in tv white space bands |
US20150304879A1 (en) * | 2008-11-24 | 2015-10-22 | MeshDynamics | Chirp networks |
US9215075B1 (en) | 2013-03-15 | 2015-12-15 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US20150381795A1 (en) * | 2011-12-23 | 2015-12-31 | Gecko Alliance Group Inc. | Method and system for providing remote monitoring and control of a bathing system |
US9350600B2 (en) * | 2013-12-27 | 2016-05-24 | Kyocera Document Solutions Inc. | Network responding method performed by an image forming apparatus that has a normal mode and a standby mode |
US20160205274A1 (en) * | 2015-01-08 | 2016-07-14 | Canon Kabushiki Kaisha | Image forming apparatus, method for controlling image forming apparatus, and recording medium |
US9442639B2 (en) | 2010-10-22 | 2016-09-13 | Gecko Alliance Group Inc. | Method and system for providing ambiance settings in a bathing system |
US9917851B2 (en) * | 2014-04-28 | 2018-03-13 | Sophos Limited | Intrusion detection using a heartbeat |
US9936160B1 (en) * | 2009-07-10 | 2018-04-03 | CSC Holdings, LLC | Automatic detection of a cable trap |
US20180270623A1 (en) * | 2017-03-15 | 2018-09-20 | Fujitsu Limited | Information processing device, information processing system, and information processing method |
US10159624B2 (en) | 2015-09-11 | 2018-12-25 | Gecko Alliance Group Inc. | Method for facilitating control of a bathing unit system and control panel implementing same |
US10225314B2 (en) | 2007-01-24 | 2019-03-05 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US20190097872A1 (en) * | 2017-09-25 | 2019-03-28 | Dasan Zhone Solutions, Inc. | System and method for remote maintenance |
US10275999B2 (en) | 2009-04-30 | 2019-04-30 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10348575B2 (en) | 2013-06-27 | 2019-07-09 | Icontrol Networks, Inc. | Control system user interface |
US10365810B2 (en) | 2007-06-12 | 2019-07-30 | Icontrol Networks, Inc. | Control system user interface |
US10380871B2 (en) | 2005-03-16 | 2019-08-13 | Icontrol Networks, Inc. | Control system user interface |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US10447491B2 (en) | 2004-03-16 | 2019-10-15 | Icontrol Networks, Inc. | Premises system management using status signal |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10530839B2 (en) | 2008-08-11 | 2020-01-07 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US10559193B2 (en) | 2002-02-01 | 2020-02-11 | Comcast Cable Communications, Llc | Premises management systems |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10616244B2 (en) | 2006-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Activation of gateway device |
US10630698B2 (en) | 2014-12-18 | 2020-04-21 | Sophos Limited | Method and system for network access control based on traffic monitoring and vulnerability detection using process related information |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10672254B2 (en) | 2007-04-23 | 2020-06-02 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10691295B2 (en) | 2004-03-16 | 2020-06-23 | Icontrol Networks, Inc. | User interface in a premises network |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US10735249B2 (en) | 2004-03-16 | 2020-08-04 | Icontrol Networks, Inc. | Management of a security system at a premises |
US10741057B2 (en) | 2010-12-17 | 2020-08-11 | Icontrol Networks, Inc. | Method and system for processing security event data |
US10747216B2 (en) | 2007-02-28 | 2020-08-18 | Icontrol Networks, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US10754304B2 (en) | 2004-03-16 | 2020-08-25 | Icontrol Networks, Inc. | Automation system with mobile interface |
US10785319B2 (en) | 2006-06-12 | 2020-09-22 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US10785316B2 (en) | 2008-11-24 | 2020-09-22 | MeshDynamics | Evolutionary wireless networks |
US10841381B2 (en) | 2005-03-16 | 2020-11-17 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US10930136B2 (en) | 2005-03-16 | 2021-02-23 | Icontrol Networks, Inc. | Premise management systems and methods |
US10979389B2 (en) | 2004-03-16 | 2021-04-13 | Icontrol Networks, Inc. | Premises management configuration and control |
US10992784B2 (en) | 2004-03-16 | 2021-04-27 | Control Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US11043112B2 (en) | 2004-03-16 | 2021-06-22 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US11116692B2 (en) | 2018-06-07 | 2021-09-14 | Gecko Alliance Group Inc. | Method, system, computer program product and device for facilitating centralized control and monitoring over a network of a set of remote bathing unit systems |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US11153266B2 (en) | 2004-03-16 | 2021-10-19 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11182060B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US11240059B2 (en) | 2010-12-20 | 2022-02-01 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11310264B2 (en) | 2014-04-28 | 2022-04-19 | Sophos Limited | Using reputation to avoid false malware detections |
US11310199B2 (en) | 2004-03-16 | 2022-04-19 | Icontrol Networks, Inc. | Premises management configuration and control |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US11368537B2 (en) | 2002-10-28 | 2022-06-21 | Dynamic Mesh Networks, Inc. | High performance wireless network |
US11368327B2 (en) | 2008-08-11 | 2022-06-21 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11398147B2 (en) | 2010-09-28 | 2022-07-26 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
US11424980B2 (en) | 2005-03-16 | 2022-08-23 | Icontrol Networks, Inc. | Forming a security network including integrated security system components |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11451409B2 (en) | 2005-03-16 | 2022-09-20 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11489812B2 (en) | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US11706045B2 (en) | 2005-03-16 | 2023-07-18 | Icontrol Networks, Inc. | Modular electronic display platform |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11792330B2 (en) | 2005-03-16 | 2023-10-17 | Icontrol Networks, Inc. | Communication and automation in a premises management system |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11816323B2 (en) | 2008-06-25 | 2023-11-14 | Icontrol Networks, Inc. | Automation system user interface |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4781199B2 (en) * | 2006-08-09 | 2011-09-28 | キヤノン株式会社 | Information processing apparatus, information processing system, information processing method, and program |
US9124491B2 (en) * | 2012-05-30 | 2015-09-01 | Nec Corporation | Internet protocol (IP) network device, network system, method thereof |
US9542250B2 (en) | 2012-09-07 | 2017-01-10 | International Business Machines Corporation | Distributed maintenance mode control |
CN106034299A (en) * | 2015-03-09 | 2016-10-19 | 中兴通讯股份有限公司 | SCTP connection reestablishment method and SCTP connection reestablishment device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6173323B1 (en) * | 1997-12-24 | 2001-01-09 | Lucent Technologies Inc. | Adaptive polling rate algorithm for SNMP-based network monitoring |
US20040024869A1 (en) * | 1998-02-27 | 2004-02-05 | Davies Stephen W. | Alarm server systems, apparatus, and processes |
US20050038889A1 (en) * | 2003-08-15 | 2005-02-17 | Thomas Frietsch | Network server and method of discovery of a network node |
US20060026301A1 (en) * | 2003-02-06 | 2006-02-02 | Fujitsu Limited | SNMP proxy agent |
US20080059623A1 (en) * | 2006-09-05 | 2008-03-06 | Won-Jong Yang | Management system and method of network elements using simple network management protocol |
US20080228908A1 (en) * | 2004-07-07 | 2008-09-18 | Link David F | Management techniques for non-traditional network and information system topologies |
-
2008
- 2008-12-16 US US12/335,671 patent/US7898939B2/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6173323B1 (en) * | 1997-12-24 | 2001-01-09 | Lucent Technologies Inc. | Adaptive polling rate algorithm for SNMP-based network monitoring |
US20040024869A1 (en) * | 1998-02-27 | 2004-02-05 | Davies Stephen W. | Alarm server systems, apparatus, and processes |
US20060026301A1 (en) * | 2003-02-06 | 2006-02-02 | Fujitsu Limited | SNMP proxy agent |
US20050038889A1 (en) * | 2003-08-15 | 2005-02-17 | Thomas Frietsch | Network server and method of discovery of a network node |
US20080228908A1 (en) * | 2004-07-07 | 2008-09-18 | Link David F | Management techniques for non-traditional network and information system topologies |
US20080059623A1 (en) * | 2006-09-05 | 2008-03-06 | Won-Jong Yang | Management system and method of network elements using simple network management protocol |
Cited By (181)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10559193B2 (en) | 2002-02-01 | 2020-02-11 | Comcast Cable Communications, Llc | Premises management systems |
US11368537B2 (en) | 2002-10-28 | 2022-06-21 | Dynamic Mesh Networks, Inc. | High performance wireless network |
US10735249B2 (en) | 2004-03-16 | 2020-08-04 | Icontrol Networks, Inc. | Management of a security system at a premises |
US11153266B2 (en) | 2004-03-16 | 2021-10-19 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US10992784B2 (en) | 2004-03-16 | 2021-04-27 | Control Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11810445B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11368429B2 (en) | 2004-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11782394B2 (en) | 2004-03-16 | 2023-10-10 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11757834B2 (en) | 2004-03-16 | 2023-09-12 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11043112B2 (en) | 2004-03-16 | 2021-06-22 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10979389B2 (en) | 2004-03-16 | 2021-04-13 | Icontrol Networks, Inc. | Premises management configuration and control |
US11893874B2 (en) | 2004-03-16 | 2024-02-06 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US10890881B2 (en) | 2004-03-16 | 2021-01-12 | Icontrol Networks, Inc. | Premises management networking |
US11656667B2 (en) | 2004-03-16 | 2023-05-23 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11625008B2 (en) | 2004-03-16 | 2023-04-11 | Icontrol Networks, Inc. | Premises management networking |
US11626006B2 (en) | 2004-03-16 | 2023-04-11 | Icontrol Networks, Inc. | Management of a security system at a premises |
US11082395B2 (en) | 2004-03-16 | 2021-08-03 | Icontrol Networks, Inc. | Premises management configuration and control |
US10796557B2 (en) | 2004-03-16 | 2020-10-06 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US11601397B2 (en) | 2004-03-16 | 2023-03-07 | Icontrol Networks, Inc. | Premises management configuration and control |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11588787B2 (en) | 2004-03-16 | 2023-02-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11537186B2 (en) | 2004-03-16 | 2022-12-27 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10754304B2 (en) | 2004-03-16 | 2020-08-25 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11489812B2 (en) | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11159484B2 (en) | 2004-03-16 | 2021-10-26 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11449012B2 (en) | 2004-03-16 | 2022-09-20 | Icontrol Networks, Inc. | Premises management networking |
US11037433B2 (en) | 2004-03-16 | 2021-06-15 | Icontrol Networks, Inc. | Management of a security system at a premises |
US10692356B2 (en) | 2004-03-16 | 2020-06-23 | Icontrol Networks, Inc. | Control system user interface |
US10691295B2 (en) | 2004-03-16 | 2020-06-23 | Icontrol Networks, Inc. | User interface in a premises network |
US11175793B2 (en) | 2004-03-16 | 2021-11-16 | Icontrol Networks, Inc. | User interface in a premises network |
US11182060B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11410531B2 (en) | 2004-03-16 | 2022-08-09 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US10447491B2 (en) | 2004-03-16 | 2019-10-15 | Icontrol Networks, Inc. | Premises system management using status signal |
US11378922B2 (en) | 2004-03-16 | 2022-07-05 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11184322B2 (en) | 2004-03-16 | 2021-11-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11310199B2 (en) | 2004-03-16 | 2022-04-19 | Icontrol Networks, Inc. | Premises management configuration and control |
US11595364B2 (en) | 2005-03-16 | 2023-02-28 | Icontrol Networks, Inc. | System for data routing in networks |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11792330B2 (en) | 2005-03-16 | 2023-10-17 | Icontrol Networks, Inc. | Communication and automation in a premises management system |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US11706045B2 (en) | 2005-03-16 | 2023-07-18 | Icontrol Networks, Inc. | Modular electronic display platform |
US10841381B2 (en) | 2005-03-16 | 2020-11-17 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US10930136B2 (en) | 2005-03-16 | 2021-02-23 | Icontrol Networks, Inc. | Premise management systems and methods |
US11367340B2 (en) | 2005-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premise management systems and methods |
US11824675B2 (en) | 2005-03-16 | 2023-11-21 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US10380871B2 (en) | 2005-03-16 | 2019-08-13 | Icontrol Networks, Inc. | Control system user interface |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US11424980B2 (en) | 2005-03-16 | 2022-08-23 | Icontrol Networks, Inc. | Forming a security network including integrated security system components |
US11451409B2 (en) | 2005-03-16 | 2022-09-20 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US10616244B2 (en) | 2006-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Activation of gateway device |
US10785319B2 (en) | 2006-06-12 | 2020-09-22 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US11418518B2 (en) | 2006-06-12 | 2022-08-16 | Icontrol Networks, Inc. | Activation of gateway device |
US11418572B2 (en) | 2007-01-24 | 2022-08-16 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US10225314B2 (en) | 2007-01-24 | 2019-03-05 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US11412027B2 (en) | 2007-01-24 | 2022-08-09 | Icontrol Networks, Inc. | Methods and systems for data communication |
US10747216B2 (en) | 2007-02-28 | 2020-08-18 | Icontrol Networks, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US10657794B1 (en) | 2007-02-28 | 2020-05-19 | Icontrol Networks, Inc. | Security, monitoring and automation controller access and use of legacy security control panel information |
US11809174B2 (en) | 2007-02-28 | 2023-11-07 | Icontrol Networks, Inc. | Method and system for managing communication connectivity |
US11194320B2 (en) | 2007-02-28 | 2021-12-07 | Icontrol Networks, Inc. | Method and system for managing communication connectivity |
US11663902B2 (en) | 2007-04-23 | 2023-05-30 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US11132888B2 (en) | 2007-04-23 | 2021-09-28 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US10672254B2 (en) | 2007-04-23 | 2020-06-02 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US11611568B2 (en) | 2007-06-12 | 2023-03-21 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11625161B2 (en) | 2007-06-12 | 2023-04-11 | Icontrol Networks, Inc. | Control system user interface |
US11894986B2 (en) | 2007-06-12 | 2024-02-06 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11632308B2 (en) | 2007-06-12 | 2023-04-18 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US10365810B2 (en) | 2007-06-12 | 2019-07-30 | Icontrol Networks, Inc. | Control system user interface |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10444964B2 (en) | 2007-06-12 | 2019-10-15 | Icontrol Networks, Inc. | Control system user interface |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11722896B2 (en) | 2007-06-12 | 2023-08-08 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11815969B2 (en) | 2007-08-10 | 2023-11-14 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US8140913B2 (en) * | 2008-04-23 | 2012-03-20 | Hitachi, Ltd. | Apparatus and method for monitoring computer system, taking dependencies into consideration |
US20090271667A1 (en) * | 2008-04-23 | 2009-10-29 | Hitachi, Ltd. | Apparatus and Method for Monitoring Computer System |
US11816323B2 (en) | 2008-06-25 | 2023-11-14 | Icontrol Networks, Inc. | Automation system user interface |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US11616659B2 (en) | 2008-08-11 | 2023-03-28 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US10530839B2 (en) | 2008-08-11 | 2020-01-07 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11641391B2 (en) | 2008-08-11 | 2023-05-02 | Icontrol Networks Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11368327B2 (en) | 2008-08-11 | 2022-06-21 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11962672B2 (en) | 2008-08-11 | 2024-04-16 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11711234B2 (en) | 2008-08-11 | 2023-07-25 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11190578B2 (en) | 2008-08-11 | 2021-11-30 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US20150304879A1 (en) * | 2008-11-24 | 2015-10-22 | MeshDynamics | Chirp networks |
US10785316B2 (en) | 2008-11-24 | 2020-09-22 | MeshDynamics | Evolutionary wireless networks |
US9819747B2 (en) * | 2008-11-24 | 2017-11-14 | MeshDynamics | Chirp networks |
US10275999B2 (en) | 2009-04-30 | 2019-04-30 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US11356926B2 (en) | 2009-04-30 | 2022-06-07 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US10813034B2 (en) | 2009-04-30 | 2020-10-20 | Icontrol Networks, Inc. | Method, system and apparatus for management of applications for an SMA controller |
US10332363B2 (en) | 2009-04-30 | 2019-06-25 | Icontrol Networks, Inc. | Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events |
US11665617B2 (en) | 2009-04-30 | 2023-05-30 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US11284331B2 (en) | 2009-04-30 | 2022-03-22 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US11223998B2 (en) | 2009-04-30 | 2022-01-11 | Icontrol Networks, Inc. | Security, monitoring and automation controller access and use of legacy security control panel information |
US11129084B2 (en) | 2009-04-30 | 2021-09-21 | Icontrol Networks, Inc. | Notification of event subsequent to communication failure with security system |
US11553399B2 (en) | 2009-04-30 | 2023-01-10 | Icontrol Networks, Inc. | Custom content for premises management |
US11778534B2 (en) | 2009-04-30 | 2023-10-03 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US10674428B2 (en) | 2009-04-30 | 2020-06-02 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US11601865B2 (en) | 2009-04-30 | 2023-03-07 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US9936160B1 (en) * | 2009-07-10 | 2018-04-03 | CSC Holdings, LLC | Automatic detection of a cable trap |
US10477142B1 (en) * | 2009-07-10 | 2019-11-12 | CSC Holdings, LLC | Automatic detection of a cable trap |
US10142587B1 (en) * | 2009-07-10 | 2018-11-27 | CSC Holdings, LLC | Automatic detection of a cable trap |
US11398147B2 (en) | 2010-09-28 | 2022-07-26 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US11900790B2 (en) | 2010-09-28 | 2024-02-13 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US10809905B2 (en) | 2010-10-22 | 2020-10-20 | Gecko Alliance Group Inc. | Method and system for assisting a user in maintaining a bathing unit system |
US10235033B2 (en) | 2010-10-22 | 2019-03-19 | Gecko Alliance Group Inc. | Method and system for providing ambiance settings in a bathing system |
US11455092B2 (en) | 2010-10-22 | 2022-09-27 | Gecko Alliance Group Inc. | Method and system for monitoring and controlling operational settings in a bathing system |
US9442639B2 (en) | 2010-10-22 | 2016-09-13 | Gecko Alliance Group Inc. | Method and system for providing ambiance settings in a bathing system |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US11341840B2 (en) | 2010-12-17 | 2022-05-24 | Icontrol Networks, Inc. | Method and system for processing security event data |
US10741057B2 (en) | 2010-12-17 | 2020-08-11 | Icontrol Networks, Inc. | Method and system for processing security event data |
US11240059B2 (en) | 2010-12-20 | 2022-02-01 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US8446920B2 (en) * | 2011-06-14 | 2013-05-21 | Mitel Networks Corporation | Providing resilient digital telephony services for wireless device |
US20150381795A1 (en) * | 2011-12-23 | 2015-12-31 | Gecko Alliance Group Inc. | Method and system for providing remote monitoring and control of a bathing system |
US9686735B2 (en) * | 2013-03-14 | 2017-06-20 | Silver Spring Networks, Inc. | Set of optimizations applicable to a wireless networks operating in TV white space bands |
US20140269506A1 (en) * | 2013-03-14 | 2014-09-18 | Silver Springs Networks, Inc. | Set of optimizations applicable to a wireless networks operating in tv white space bands |
US9942051B1 (en) | 2013-03-15 | 2018-04-10 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US10841104B2 (en) | 2013-03-15 | 2020-11-17 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US11930126B2 (en) | 2013-03-15 | 2024-03-12 | Piltorak Technologies LLC | System and method for secure relayed communications from an implantable medical device |
US10305695B1 (en) | 2013-03-15 | 2019-05-28 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US11588650B2 (en) | 2013-03-15 | 2023-02-21 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US9215075B1 (en) | 2013-03-15 | 2015-12-15 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US11296950B2 (en) | 2013-06-27 | 2022-04-05 | Icontrol Networks, Inc. | Control system user interface |
US10348575B2 (en) | 2013-06-27 | 2019-07-09 | Icontrol Networks, Inc. | Control system user interface |
US9350600B2 (en) * | 2013-12-27 | 2016-05-24 | Kyocera Document Solutions Inc. | Network responding method performed by an image forming apparatus that has a normal mode and a standby mode |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
US11943301B2 (en) | 2014-03-03 | 2024-03-26 | Icontrol Networks, Inc. | Media content management |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US11621968B2 (en) | 2014-04-28 | 2023-04-04 | Sophos Limited | Intrusion detection using a heartbeat |
US9917851B2 (en) * | 2014-04-28 | 2018-03-13 | Sophos Limited | Intrusion detection using a heartbeat |
US11303654B2 (en) | 2014-04-28 | 2022-04-12 | Sophos Limited | Intrusion detection using a heartbeat |
US11310264B2 (en) | 2014-04-28 | 2022-04-19 | Sophos Limited | Using reputation to avoid false malware detections |
US11722516B2 (en) | 2014-04-28 | 2023-08-08 | Sophos Limited | Using reputation to avoid false malware detections |
US10673873B2 (en) | 2014-04-28 | 2020-06-02 | Sophos Limited | Intrusion detection using a heartbeat |
US10630698B2 (en) | 2014-12-18 | 2020-04-21 | Sophos Limited | Method and system for network access control based on traffic monitoring and vulnerability detection using process related information |
US11616791B2 (en) | 2014-12-18 | 2023-03-28 | Sophos Limited | Process-specific network access control based on traffic monitoring |
US11882136B2 (en) | 2014-12-18 | 2024-01-23 | Sophos Limited | Process-specific network access control based on traffic monitoring |
US10979441B2 (en) | 2014-12-18 | 2021-04-13 | Sophos Limited | Method and system for network access control based on traffic monitoring and vulnerability detection using process related information |
US9686425B2 (en) * | 2015-01-08 | 2017-06-20 | Canon Kabushiki Kaisha | Image forming apparatus, method for controlling image forming apparatus, and recording medium |
US20160205274A1 (en) * | 2015-01-08 | 2016-07-14 | Canon Kabushiki Kaisha | Image forming apparatus, method for controlling image forming apparatus, and recording medium |
US11213455B2 (en) | 2015-09-11 | 2022-01-04 | Gecko Alliance Group Inc. | Method for facilitating control of a bathing unit system and control panel implementing same |
US10159624B2 (en) | 2015-09-11 | 2018-12-25 | Gecko Alliance Group Inc. | Method for facilitating control of a bathing unit system and control panel implementing same |
US10624812B2 (en) | 2015-09-11 | 2020-04-21 | Gecko Alliance Group Inc. | Method for facilitating control of a bathing unit system and control panel implementing same |
US20180270623A1 (en) * | 2017-03-15 | 2018-09-20 | Fujitsu Limited | Information processing device, information processing system, and information processing method |
US10631135B2 (en) * | 2017-03-15 | 2020-04-21 | Fujitsu Limited | Information processing device, information processing system, and information processing method |
US20190097872A1 (en) * | 2017-09-25 | 2019-03-28 | Dasan Zhone Solutions, Inc. | System and method for remote maintenance |
US10616039B2 (en) * | 2017-09-25 | 2020-04-07 | Dasan Zhone Solutions, Inc. | System and method for remote maintenance |
US11116692B2 (en) | 2018-06-07 | 2021-09-14 | Gecko Alliance Group Inc. | Method, system, computer program product and device for facilitating centralized control and monitoring over a network of a set of remote bathing unit systems |
US11759391B2 (en) | 2018-06-07 | 2023-09-19 | Gecko Alliance Group Inc. | Method, system, computer program product and device for facilitating centralized control and monitoring over a network of a set of remote bathing unit systems |
Also Published As
Publication number | Publication date |
---|---|
US7898939B2 (en) | 2011-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7898939B2 (en) | Scalable and robust mechanism for remote IP device monitoring with changing IP address assignment | |
US11381414B2 (en) | System and method for providing network support services and premises gateway support infrastructure | |
US20110149720A1 (en) | System for and method of performing residential gateway diagnostics and corrective actions | |
EP3382988B1 (en) | Method for self-provisioning of cable modems and multimedia terminal adapters | |
TW200304741A (en) | Apparatus and method for managing cable modem based on Web | |
US10492088B2 (en) | Technique for accessing at least one administration server | |
KR100952975B1 (en) | Apparatus and method of management of wireless AP for enterprise |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AT&T INTELLECTUAL PROPERTY I, L.P.,NEVADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LEE, HERMAN H.;BROTZ, RICHARD A.;CHAO, CHIN-WANG;AND OTHERS;SIGNING DATES FROM 20081210 TO 20081217;REEL/FRAME:022000/0167 Owner name: AT&T INTELLECTUAL PROPERTY I, L.P., NEVADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LEE, HERMAN H.;BROTZ, RICHARD A.;CHAO, CHIN-WANG;AND OTHERS;SIGNING DATES FROM 20081210 TO 20081217;REEL/FRAME:022000/0167 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20230301 |